Network Security & Penetration Testing

Network Security & Penetration Testing from Condition Zebra (M) Sdn Bhd

By: Condition Zebra (M) Sdn Bhd  12-02-2015
Keywords: Firewalls, Virtual Private Network, Intrusion Detection System

This network security course fully arms you to address the information security concerns within the organization for data protection. You will gain in-depth understanding on the network hacking tools usage and how to conduct the network penetration testing in a careful, and professional manner. This course will also demonstrates various network hacking techniques as well as penetration testing methodologies to help you identify network security vulnerabilities.

Keywords: Application Security, E-mail Security, Firewalls, Intrusion Detection System, Intrusion Prevention System, Network Protocol, Network Security Threats, Network Vulnerabilities Assessment, Virtual Private Network, Wireless Network Security,

Contact Condition Zebra (M) Sdn Bhd


Print this page


Other products and services from Condition Zebra (M) Sdn Bhd

Mobile Hacking and Security from Condition Zebra (M) Sdn Bhd thumbnail

Mobile Hacking and Security

This Mobile Hacking and Security training exposes the mobile hacking techniques and countermeasures for iOS and Android. Throughout the 4-day session, you will also get to practise how to analyze and evaluate mobile app threats as well as exploring how the attackers identify weaknesses. This intensive mobile hacking training is designed to equip you with the required knowledge and skills in securing mobile devices, mobile applications and mobile networks of their organization.

Advanced Web Hacking and Defense from Condition Zebra (M) Sdn Bhd thumbnail

Advanced Web Hacking and Defense

This class focuses on providing you hands-on experience of real world web attacks. You will learn the most common threats against web applications and updated advanced web exploitation techniques. Throughout the training, you will be exposed to how web application vulnerabilities can be exploited and learn to conduct web application risk assessment.